| VID |
16102 |
| Severity |
20 |
| Port |
21 |
| Protocol |
TCP |
| Class |
FTP |
| Detailed Description |
The WU-FTPD, according to its banner, has a denial of service vulnerability via a glob pattern with multiple '*' characters. WU-FTPD is an ftp daemon for Linux platforms developed at Washington University. WU-FTPD versions 2.6.1 and 2.6.2 are vulnerable to a denial of service attack. The vulnerability exists in the wu_fnmatch() function in wu_fnmatch.c file. By sending an FTP DIR command containing a large number of '*' characters as a parameter, a remote attacker could cause an affected server to exhaust all available resources on the server.
* Note: This check solely relied on the banner of the remote FTP server to assess this vulnerability, so this might be a false positive.
* References: http://www.idefense.com/application/poi/display?id=207&type=vulnerabilities&flashstatus=true
* Platforms Affected: Washington University, wu-ftpd 2.6.1 and 2.6.2 Linux Any version Unix Any version |
| Recommendation |
No upgrade or patch available as of March 2005.
Upgrade to the new version of WU-FTPD (2.6.2 later), when new version fixed this problem becomes available from the WU-FTPD Web site at http://www.wu-ftpd.org |
| Related URL |
CVE-2005-0256 (CVE) |
| Related URL |
(SecurityFocus) |
| Related URL |
19495 (ISS) |
|